In this CISSP study guide, learn about business continuity disaster recovery planning and how to endure and survive an enterprise disaster event.

Share this item with your network:

Not only must information security professionals be skilled in many areas of security execution, but they must also be prepared to assist companies in bringing wrongdoers to justice. To do this, security pros must be knowledgeable on laws pertaining to privacy, civil and criminal activity.

In this CISSP Essentials Security School lesson, Domain 8, Legal, Regulations, Investigations and Compliance, expert CISSP exam trainer Shon Harris details how the issues of investigating computer crimes, the role of forensics, types of evidence and how to ensure that companies are compliant to applicable laws. Above all, security professionals must be prepared to apply prudent judgment, often in tense situations, so that appropriate decisions will be made.

ABOUT CISSP ESSENTIALS

Discover what you need to know to ace the CISSP exam with this series of CISSP certification training lessons. Each lesson, which contains a video, domain spotlight article and a quiz with sample CISSP exam questions, corresponds to a specific domain in the CISSP exam's "Common Body of Knowledge" -- the essential elements each CISSP-certified practitioner must know.

Before watching the special Domain 8, Legal, Regulations, Investigations and Compliance video below, it's recommended that students first read the Domain 8 spotlight article, which provides an overview of the concepts presented in the video, such as professional ethics as they pertain to security professionals and best practices; types of computer crime and the traditional laws and cyberlaws put into effect to fight computer crime; attack profiles, hacker motives and objectives; and incident handling, investigation techniques and procedures, types of evidence and evidence handling.

About Shon Harris:Shon Harris is a CISSP, MCSE and President of Logical Security, a firm specializing in security educational and training tools. Logical Security offers curriculum, virtual labs, instructor slides and tools for lease by training companies, security companies, military organizations, government sectors and corporations.

Shon is also a security consultant, an engineer in the Air Force's Information Warfare unit, an entrepreneur and an author. She has authored two best selling CISSP books, including CISSP All-in-One Exam Guide, and was a contributing author to the book Hacker's Challenge. Shon is currently finishing her newest book, Gray Hat Hacking: The Ethical Hacker's Handbook.

Start the conversation

0 comments

Register

I agree to TechTarget’s Terms of Use, Privacy Policy, and the transfer of my information to the United States for processing to provide me with relevant information as described in our Privacy Policy.

Please check the box if you want to proceed.

I agree to my information being processed by TechTarget and its Partners to contact me via phone, email, or other means regarding information relevant to my professional interests. I may unsubscribe at any time.